AUTHOR ARCHIVES

Adam Clark Estes

May 10, 2013
FROM NEXTGOV
If there's any phrase an astronaut never wants to mutter, it's "Houston, we have a problem." Calling from the International Space Station on Thursday evening, Commander Chris Hadfield did just that. Well, he didn't actually quote that excellent Tom Hanks movie, but he did make a distressing call down to...

May 6, 2013
FROM NEXTGOV
The Financial Times reports that the long-rumored paid subscription model is coming to YouTube as early as this week. The strategy will help YouTube compete not only with other online outlets like Netflix and Hulu but also with major networks like CBS. However, it's also a sea change in the...

May 6, 2013
A member of the United Nations commission of inquiry announced on a Swiss-Italian television show that they believe the Syrian rebels have used chemical weapons on Assad's troops. "Our investigators have been in neighboring countries interviewing victims, doctors and field hospitals and, according to their report of last week which...

May 3, 2013
As more details of Dzhokhar Tsarnaev's bedside interrogation leak out, we learned on Thursday night that the brothers originally planned a Fourth of July attack but built their bomb too quickly, leading them to consider another target. An information-rich and just published New York Time spiece explains a series of...

April 30, 2013
FROM NEXTGOV
A little less than a week after a hacked Associated Press account reported a non-existent bombing at the White House, Twitter decided it was time to comfort journalists by warning them that they should expect to get hacked. "We believe that these attacks will continue, and that news and media...

April 29, 2013
Afghan president Hamid Karzai has a sugar daddy, and its name is the Central Intelligence Agency. Or at least it had a sugar daddy. For over ten years, American spies greased Karzai's palms about once a month with suitcases, backpacks and even plastic grocery bags full of cash. And not...

April 26, 2013
FROM NEXTGOV
After stirring up trouble for months, the Cyber Intelligence Sharing and Protection Act died a quiet death in the Senate on Thursday. Despite the bill's passage in the House, Senators decided to pigeonhole the legislation. It was not necessarily a surprising move for the upper chamber, especially given the fact...

April 25, 2013
In a marathon session before a weeklong recess, Senators finally found a way to agree on something Thursday night, when they passed a bill to end flight controller furloughs. Thanks to the sequester, the Federal Aviation Administration has to figure out a way to save $637 million before Sept. 30,...

April 25, 2013
The U.S. intelligence committee is already contradicting itself as the investigation into the Boston bombing unfolds. Turns out the CIA knew about one of the Tsarnaev brothers after all. In fact, the sleuths in Langley added Tamerlan Tsarnaev to a watchlist a full 18 months before the attack on the...

April 24, 2013
FROM NEXTGOV
Some Twitter employee — probably several employees, actually — had a pretty rough day on Tuesday, after a hack led to the AP sending a fake tweet to its 2 million followers. If only the hacker had waited, Twitter could've stopped them! Minutes before appearing on the Rachel Maddow Show...

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.